Deletion Is a Lie
When you delete a file from a cloud service, it is not deleted. It is marked for deletion. It moves to a soft-delete state, where it remains accessible for thirty, sixty, or ninety days — or longer, depending on the provider’s internal policies, which are rarely disclosed and frequently changed. Even after the retention period expires, the data persists in backups, replicas, disaster recovery snapshots, and log files distributed across multiple data centers in multiple jurisdictions.
When a cloud provider tells you that your data has been deleted, what they mean is that they have stopped showing it to you. The data itself continues to exist in forms and locations that you cannot see, cannot access, and cannot control. It persists in database transaction logs. It persists in search indexes. It persists in machine learning training sets. It persists in the memory of systems you never knew existed.
True deletion — the complete, irrecoverable, verifiable elimination of data from all storage media — is functionally impossible in traditional cloud architecture. The only way to guarantee that data cannot be recovered is to ensure that it was never stored in the first place.
This is the Zero-Persistence Principle: what never existed cannot be stolen.
The Architecture of Forgetting
Stealth Cloud implements zero persistence not as a policy but as a physical constraint of the system architecture. The distinction matters. A policy can be changed. A configuration can be modified. An executive decision can reverse a retention setting. But a system that is architecturally incapable of persistence cannot be reconfigured to remember, any more than a sieve can be reconfigured to hold water.
The implementation rests on three pillars.
RAM-only processing. All computation occurs in memory, in Cloudflare Workers V8 isolates. These are lightweight execution environments that spin up for a single request and are destroyed upon completion. They do not write to disk. They do not access persistent file systems. They do not maintain state between invocations. The V8 isolate is the computational equivalent of a conversation in a soundproof room: when the participants leave, the room retains nothing.
Every prompt you send to Ghost Chat is decrypted in a V8 isolate, processed, and the isolate is terminated. The RAM is released back to the operating system. There is no disk I/O, no database write, no log entry. The computation existed for milliseconds and then it did not.
Cryptographic shredding. For the brief moments when encrypted data must exist in transit or in temporary state, the encryption keys are ephemeral. A unique AES-256-GCM key is generated for each session using the Web Crypto API. When the session ends, the key is destroyed via crypto.subtle.destroyKey(). Without the key, the ciphertext is indistinguishable from random noise. Even if an attacker could somehow capture the encrypted bytes in transit, they would possess nothing but entropy.
This is not a theoretical protection. It is a mathematical one. AES-256 has a key space of 2^256 possible keys. Brute-forcing this space would require more energy than exists in the observable universe. Destroying the key does not merely make decryption difficult. It makes decryption physically impossible.
Ephemeral infrastructure. The infrastructure itself is transient. Cloudflare Workers do not run on dedicated servers that accumulate state over time. They run on an edge network of thousands of nodes, with workloads distributed dynamically based on proximity and availability. There is no single server to seize, no hard drive to image, no data center to raid. The computation happens at the edge closest to the user, in a container that exists for the duration of the request, and then the container is gone.
This is qualitatively different from traditional server architecture, where a physical machine accumulates data over months or years of operation — in swap files, in temporary directories, in kernel buffers, in the magnetic residue of previously written sectors. Zero-persistence architecture eliminates the machine itself as a vector for data recovery.
The Philosophical Case
Zero persistence is not just a technical architecture. It is a statement about the default relationship between humans and machines.
The current default is accumulation. Every system, every service, every platform assumes that data should be kept. The question is never whether to store data, only how long and where. This default exists because data has economic value — to the company that stores it, to the advertisers who target against it, to the AI models that train on it. Persistence is profitable.
But profitable for whom? Not for the user whose private thoughts are stored in a database they cannot access, protected by security they cannot verify, subject to terms they did not read, and available to governments they did not elect. The persistence default serves the platform, not the person.
We invert this default. In Stealth Cloud architecture, ephemeral is the baseline. If you want to save something, you must explicitly choose to do so, and the saved data will be encrypted with keys that only you control. But the default — the state that requires no action, no decision, no configuration — is that your data ceases to exist the moment you are done with it.
This inversion is philosophical before it is technical. It begins with the conviction that your data is yours, that computation performed on your behalf should not leave residue for others to collect, and that the burden of justification falls on persistence, not on ephemerality. You should not have to explain why you want your data deleted. The system should have to explain why it wants to keep it.
The Legal Advantage
Zero persistence transforms the legal landscape. A subpoena demands the production of records. If no records exist, the subpoena is moot. A warrant authorizes the search and seizure of data. If no data exists, the warrant finds nothing. A breach notification law requires disclosure when personal data is exposed. If no personal data was retained, there is nothing to expose and nothing to disclose.
This is not a loophole. It is the architecture working as designed. We do not refuse to comply with lawful requests. We are incapable of complying, because the data requested does not exist. This is the difference between a company that says “we will not give you the data” and a company that says “the data is not here.” The first is a policy position. The second is a physical fact.
Every data breach in history — every single one — was a breach of stored data. Data that was accumulated, retained, and insufficiently protected. Zero-persistence architecture does not make breaches less damaging. It makes them impossible. You cannot breach what does not exist.
The Performance Argument
A common objection to ephemeral architecture is that it sacrifices performance. That persistence enables caching, personalization, and optimization that ephemeral systems cannot match.
This objection is outdated. Edge computing has reduced latency to the point where recomputation is faster than cache retrieval from a centralized data store. Cloudflare’s network processes requests within milliseconds at over 300 locations worldwide. The performance cost of zero persistence is not zero, but it is negligible — and it is shrinking with every generation of edge infrastructure.
The question is not whether you can afford zero persistence. The question is whether you can afford the alternative: an ever-growing repository of sensitive data, protected by security that degrades over time, subject to an expanding legal and regulatory surface area, and vulnerable to an attacker who has all the time in the world while you must be perfect every moment of every day.
The Stealth Cloud Perspective
Data at rest is data at risk. The Zero-Persistence Principle eliminates the risk by eliminating the rest. We do not build better vaults. We build infrastructure where there is nothing to lock up, nothing to steal, and nothing to surrender.